Yubikey: Difference between revisions
mNo edit summary |
|||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
| |||
= Links = | = Links = | ||
*[https://github.com/drduh/YubiKey-Guide YubiKey Guide] | |||
*[https://www.yubico.com/products/services-software/download/ Download the tool] | *[https://www.yubico.com/products/services-software/download/ Download the tool] | ||
*[https://developers.yubico.com/OTP/Guides/Self-hosted_OTP_validation.html Setup of a self-hosted Yubico OTP validation server] | *[https://developers.yubico.com/OTP/Guides/Self-hosted_OTP_validation.html Setup of a self-hosted Yubico OTP validation server] | ||
Line 9: | Line 12: | ||
*[https://github.com/cgkades/yubiserver/blob/master/README https://github.com/cgkades/yubiserver/blob/master/README] | *[https://github.com/cgkades/yubiserver/blob/master/README https://github.com/cgkades/yubiserver/blob/master/README] | ||
*[https://www.esev.com/blog/post/2015-01-pgp-ssh-key-on-yubikey-neo/ PGP and SSH keys on a Yubikey NEO] | *[https://www.esev.com/blog/post/2015-01-pgp-ssh-key-on-yubikey-neo/ PGP and SSH keys on a Yubikey NEO] | ||
*[https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP Yubikey and GPG] | |||
*[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide] | *[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide] | ||
=Notes= | |||
Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW?? | Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW?? | ||
Line 17: | Line 21: | ||
[https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup] | [https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup] | ||
= HOWTO = | |||
== Registering yubikey cloud == | == Registering yubikey cloud == | ||
Line 23: | Line 29: | ||
Yubico API key signup | Yubico API key signup | ||
Prompts for "YubiKey OTP" | Prompts for "YubiKey OTP" Looks like you're supposed to just tap the key | ||
what did i need this for? at least went through upload | what did i need this for? at least went through upload | ||
; | |||
[https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm] nigrore this one? | [https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm] nigrore this one? | ||
Line 41: | Line 45: | ||
| | ||
== Using key with linux == | |||
[https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux] | |||
wget -O /etc/udev/rules.d/70-u2f.rules [https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules] | |||
apt install libyubikey-udev | |||
udevadm trigger | |||
== Test your Yubikey OTP == | |||
https://demo.yubico.com/otp/verify | |||
= FAQ = | = FAQ = | ||
== What kind of OTP does Yubikey use?== | == What kind of OTP does Yubikey use? == | ||
Single use ordered | Single use ordered | ||
| |||
== OTP verify url == | |||
[https://demo.yubico.com/otp/verify https://demo.yubico.com/otp/verify] | |||
https://demo.yubico.com/otp/verify | |||
== Failled connecting to the Yubikey. Make sure the application has the required permissions == | == Failled connecting to the Yubikey. Make sure the application has the required permissions == | ||
Line 62: | Line 78: | ||
== Yubico API key signup: Invalid OTP == | == Yubico API key signup: Invalid OTP == | ||
got through the upload thing first? | got through the upload thing first? The upload url from doc is bad! remove comma! | ||
The upload url from doc is bad! remove comma! | |||
| |||
| |
Latest revision as of 15:18, 10 September 2024
Links
- YubiKey Guide
- Download the tool
- Setup of a self-hosted Yubico OTP validation server
- Yubikey PHP Library
- How To Configure Your Yubikey for Maximum Usefulness & Security
- Using the Yubikey for two-factor authentication on Linux
- https://github.com/cgkades/yubiserver/blob/master/README
- PGP and SSH keys on a Yubikey NEO
- Yubikey and GPG
- https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 YubiKey 4 series GPG and SSH setup guide]
Notes
Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??
https://github.com/liyanchang/yubikey-setup
HOWTO
Registering yubikey cloud
Yubico API key signup
Prompts for "YubiKey OTP" Looks like you're supposed to just tap the key
what did i need this for? at least went through upload
https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm nigrore this one?
https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide
Using key with linux
https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux
wget -O /etc/udev/rules.d/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules apt install libyubikey-udev udevadm trigger
Test your Yubikey OTP
https://demo.yubico.com/otp/verify
FAQ
What kind of OTP does Yubikey use?
Single use ordered
OTP verify url
https://demo.yubico.com/otp/verify
Failled connecting to the Yubikey. Make sure the application has the required permissions
yubikey-manager-qt -> OTP install libyubikey-udev or
Yubico API key signup: Invalid OTP
got through the upload thing first? The upload url from doc is bad! remove comma!
Using yubikey with github
https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2
Run
Github settings->authentication->Account security->Enable two factor authentication->Authenticator app Copy the key
ykman oath accounts add <SERVICE_NAME> <YOUR_BASE32_KEY>
To get code:
ykman oath code github.com